CVE-2014-2095CVE-2014-2095

Affected configuration(s):

cpe:/a:catfish_project:catfish:0.6.0
cpe:/a:catfish_project:catfish:0.6.1
cpe:/a:catfish_project:catfish:0.6.2
cpe:/a:catfish_project:catfish:0.6.3
cpe:/a:catfish_project:catfish:0.6.4
cpe:/a:catfish_project:catfish:0.8.0
cpe:/a:catfish_project:catfish:0.8.1
cpe:/a:catfish_project:catfish:0.8.2
cpe:/a:catfish_project:catfish:1.0.0

Date published: 2014-02-26T09:55:08.583-05:00

Date last modified: 2014-03-11T12:56:27.457-04:00

CVSS Score: 4.6

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://openwall.com/lists/oss-security/2014/02/25/2

Summary: Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.